Method and system for realizing distribution of smart cards

A technology of smart cards and instructions, applied in the field of smart cards, can solve problems such as data tampering

Active Publication Date: 2012-10-03
DATANG MICROELECTRONICS TECH CO LTD
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0024] 3) Data may be tampered with during transmission
[0025] Therefore, the traditional method needs to conduct security management appraisal on the issuance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing distribution of smart cards
  • Method and system for realizing distribution of smart cards
  • Method and system for realizing distribution of smart cards

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0067] The technical solution of the present invention will be described in detail below with reference to the drawings and preferred embodiments. It should be understood that the embodiments exemplified below are only used to illustrate and explain the present invention, and do not constitute a limitation to the technical solution of the present invention.

[0068] Such as figure 1 Shown is the flow of an embodiment of the method for implementing smart card issuance provided by the present invention, including the following steps:

[0069] 110: The smart card installs the application through the main security domain;

[0070] When the installed application is not associated with the main security domain (ISD) (for example, the installed application has multiple providers), the installed application needs to be associated with the ISD.

[0071] For example, an application that installs a card through the ISD of the private network (U)SIM can associate the (U)SIM application of the pri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for realizing distribution of smart cards. The method comprises the following steps that: the smart cards are installed with applications by virtue of a main security domain; and a distribution system establishes a secure channel with the smart cards through mutual authentication, and a session key is dynamically generated. According to the invention, a mutual authentication process is carried out between the distribution system and the smart cards, and the session key is generated in a dispersed manner in the process by adopting a random number and is difficult to obtain, thus safety is good. By adopting a method that sensitive data is encrypted, security, completeness and safety of the sensitive data are guaranteed. By combining diversified data encryption and security technologies, a password is difficult to break, thus safety when the smart card applies individual data in a smart card distribution process can be guaranteed.

Description

technical field [0001] The invention relates to smart card technology, in particular to a method and system for realizing smart card issuance. Background technique [0002] With the development of telecommunication technology, mobile communication network is not only widely used in public network, but also plays an important role in some special fields, such as military department, commercial organization and urban emergency. In these application scenarios, military or commercial confidential data is involved, and the security requirements are higher than those of public networks. For the (U)SIM card, in terms of security assurance, it not only needs to play the role of user identity authentication in the public network, but also needs to be able to ensure the confidentiality, integrity and source legality of data in terms of sensitive data communication. [0003] According to the IS010202-1 specification, the smart card life cycle is divided into 5 stages: [0004] The fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/06
Inventor 许晶张靖
Owner DATANG MICROELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products